SlideShare une entreprise Scribd logo
1  sur  16
A Survey on Security
Attacks in Wireless Sensor
Networks
Published in: Computing for Sustainable Global Development
(INDIACom), 2016 3rd International Conference on
Date of Conference: 16-18 March 2016
Date Added to IEEE Xplore: 31 October 2016
Muhammad Farooq Hussain
C# 01
The greatest innovation in the field of
telecommunication is Wireless Sensor Networks
(WSN's). In today's world WSN's become the research
area due to huge number of application taking the
advantage from it. Application of WSN includes, habitat
monitoring, security surveillance and home entry
system. This presentation will give some idea about the
fundamentals, challenges and security goals in WSN's
and also the different types of attacks in WSN due to
which data is lost or insecure from third parties and
also consumes energy of nodes. Finally concluded that
it helps to readers to have better view on Wireless
Sensor Networks.
Introduction
• In past few years,WSN have become increasingly one
of the most interesting research area overhead.
• A typical WSN consists of a large number of small
sized inexpensive nodes that integrates computing,
sensing and wireless communication proficiency .
• In WSN security and privacy are the enormous
challenges
Types
 Underwater wireless sensor network
 Space-based wireless sensor network
 Wireless underground sensor network
Elements of WSN
Node: Autonomous sensor-equipped device .
Data gatherer: Data capturer (also connected to
external system) & a gateway to external
system.
External system: Data storing and managing
centers, works on those values which is
provided by both the node and data gatherer
Field devices: Field device is also known as Sensor motes
and the devices are mounted in the process and must be
capable of routing packets on behalf of other devices
Gateway: A Gateway enables communication between
Host application and field devices. Therefore it is called
as Access points.
Network manager: A Network Manager is responsible for
configuration of the network, scheduling communication
between devices (i.e., configuring ), management of the
routing tables and monitoring and reporting the health
of the network.
Security manager: The Security Manager is responsible for
the generation, storage, and management of keys.
Main Aspects
• Obstacles to WSN security.
• Requirements of a Secure WSN.
• Attacks.
• Defensive Measures.
Network Security Fundamentals
• Confidentiality: means that security mechanism
must ensure that only intended receiver can
correctly intercept a message and unauthorized
access and usage can’t be done
• Integrity : an unauthorized individual is not to be
able to destroy the information, when a message is
transfer from the sender to the receiver
• Availability : an interruption shouldn’t occur, when a
system and application are performing their tasks
Challenges of security in WSNs
• Remote Location: most of the WSN’s are operated in
remoted area locations are very far away from our
reach, b/c of this, they are left unattended.
• Lack of central control: There is always a central
point of control in sensor networks because of their
scale and network dynamics.
• Error Prone communications: there are variety of
reasons, that includes errors are situated in channel,
failure of router and collisions, packets in WSN may
be lost or corrupted.
• Resource constraint : traditional security mechanism
that have very high overheads, for this resource
constrained WSN’s are not suitable
Security Attacks in WSN’s
• Two categories :
Active attacks & passive attacks
• In passive attacks the realization of this attack is easy
and difficult to detect . Traffic analysis, traffic
monitoring are the various examples of passive attack
• In active attacks an attacker tries to romve or modify
the message which are transmitted on the network.
Jaming, DOS, message replay are the examples
Attacks
• Vulnerable to a multitude of attacks such as
DoS, traffic analysis, privacy violation, physical
attacks and so on.
• DoS: Jamming a node or set of nodes by
transmission of a radio signal that interferes
with radio frequencies being used.
• Violate the communication protocol thus
depleting valuable battery life.
More attacks
• Sybil attack:
– Sybil attack is a huge destructive attack in sensor
network, in this attack, a sensor nodes behaves as
if it were a large number of nodes, by faking other
nodes
– Originally used against peer to peer networks but
may also be used to disrupt routing algorithms,
data aggregation etc.
• Traffic Analysis Attacks: Take over the base
station/nodes closest to base station.
More attacks
• Wormhole attack:
– In wormhole attack attackers records a packet at one
location in the network and send them to another
location and replays it there.
• DOS attack:
In DOS attack, an attacker tries to make service
or system inaccessible .
• Jamming :
A well known attack, it disturb the radio
channel by sending useless information on the
frequency band use. Jamming can be temporary
or permanent.
Defensive Measures
• Key Establishment.
• Secure Broadcasting and Multicasting.
• More efficient routing protocols.
• Intrusion Detection.
Conclusion and Future Work
Networks are shifted from wired to wireless quickly, WSNs
is growing day by day and hot field in the area of research.
WSNs are cost effective because it saves the Energy by
using low power tiny sensor nodes that makes it popular,
with the addition of different other features.WSNs have a
variety of features and types that can accommodate many
problems arising in different scenarios. The only need is the
selection of the right approach on the right place, for
getting the maximum benefit from the WSN and its types.
I have a plan to find out an algorithm or mechanism that
improves the performance and security issues, of the WSN.
My presentation enhances the base for this emerging field
and after it, i will pick a particular problem in WSN and
work for an efficient approach

Contenu connexe

Tendances

Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemMohit Belwal
 
Applications of WSN
Applications of WSNApplications of WSN
Applications of WSNADEEBANADEEM
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor networkRABIA ASHRAFI
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Environmental wireless sensors networks
Environmental wireless sensors networksEnvironmental wireless sensors networks
Environmental wireless sensors networksAchref Ben helel
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor networkrasyidi usman
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network pptPramod Kuruvatti
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 

Tendances (20)

Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Applications of WSN
Applications of WSNApplications of WSN
Applications of WSN
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Environmental wireless sensors networks
Environmental wireless sensors networksEnvironmental wireless sensors networks
Environmental wireless sensors networks
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor network
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 

En vedette

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Who has the data ... and will breach the duty of confidence
Who has the data ... and will breach the duty of confidenceWho has the data ... and will breach the duty of confidence
Who has the data ... and will breach the duty of confidenceEmil Lupu
 
WSN Security Research Directions
WSN Security Research DirectionsWSN Security Research Directions
WSN Security Research DirectionsEmil Lupu
 
An ontology for attacks in wireless sensor networks
An ontology for attacks in wireless sensor networksAn ontology for attacks in wireless sensor networks
An ontology for attacks in wireless sensor networksfying1982
 
Autonomous Pervasive Systems and the Policy Challenges of a Small World!
Autonomous Pervasive Systems and the Policy Challenges of a Small World!Autonomous Pervasive Systems and the Policy Challenges of a Small World!
Autonomous Pervasive Systems and the Policy Challenges of a Small World!Emil Lupu
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkMuhammad Kaife Uddin
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 

En vedette (7)

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Who has the data ... and will breach the duty of confidence
Who has the data ... and will breach the duty of confidenceWho has the data ... and will breach the duty of confidence
Who has the data ... and will breach the duty of confidence
 
WSN Security Research Directions
WSN Security Research DirectionsWSN Security Research Directions
WSN Security Research Directions
 
An ontology for attacks in wireless sensor networks
An ontology for attacks in wireless sensor networksAn ontology for attacks in wireless sensor networks
An ontology for attacks in wireless sensor networks
 
Autonomous Pervasive Systems and the Policy Challenges of a Small World!
Autonomous Pervasive Systems and the Policy Challenges of a Small World!Autonomous Pervasive Systems and the Policy Challenges of a Small World!
Autonomous Pervasive Systems and the Policy Challenges of a Small World!
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 

Similaire à Wireless Sensor Network

eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkijwmn
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks securityelango30
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
Denial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNDenial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNIJERA Editor
 
wireless sensor network security
wireless sensor network securitywireless sensor network security
wireless sensor network securityaibad ahmed
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksIOSR Journals
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security ghaidaa WN
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Key management techniques in wireless sensor networks
Key management techniques in wireless sensor networksKey management techniques in wireless sensor networks
Key management techniques in wireless sensor networksIJNSA Journal
 

Similaire à Wireless Sensor Network (20)

eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Denial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNDenial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSN
 
wireless sensor network security
wireless sensor network securitywireless sensor network security
wireless sensor network security
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networks
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor Networks
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Key management techniques in wireless sensor networks
Key management techniques in wireless sensor networksKey management techniques in wireless sensor networks
Key management techniques in wireless sensor networks
 

Dernier

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Wireless Sensor Network

  • 1. A Survey on Security Attacks in Wireless Sensor Networks Published in: Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on Date of Conference: 16-18 March 2016 Date Added to IEEE Xplore: 31 October 2016 Muhammad Farooq Hussain C# 01
  • 2. The greatest innovation in the field of telecommunication is Wireless Sensor Networks (WSN's). In today's world WSN's become the research area due to huge number of application taking the advantage from it. Application of WSN includes, habitat monitoring, security surveillance and home entry system. This presentation will give some idea about the fundamentals, challenges and security goals in WSN's and also the different types of attacks in WSN due to which data is lost or insecure from third parties and also consumes energy of nodes. Finally concluded that it helps to readers to have better view on Wireless Sensor Networks.
  • 3. Introduction • In past few years,WSN have become increasingly one of the most interesting research area overhead. • A typical WSN consists of a large number of small sized inexpensive nodes that integrates computing, sensing and wireless communication proficiency . • In WSN security and privacy are the enormous challenges
  • 4. Types  Underwater wireless sensor network  Space-based wireless sensor network  Wireless underground sensor network
  • 5. Elements of WSN Node: Autonomous sensor-equipped device . Data gatherer: Data capturer (also connected to external system) & a gateway to external system. External system: Data storing and managing centers, works on those values which is provided by both the node and data gatherer
  • 6.
  • 7. Field devices: Field device is also known as Sensor motes and the devices are mounted in the process and must be capable of routing packets on behalf of other devices Gateway: A Gateway enables communication between Host application and field devices. Therefore it is called as Access points. Network manager: A Network Manager is responsible for configuration of the network, scheduling communication between devices (i.e., configuring ), management of the routing tables and monitoring and reporting the health of the network. Security manager: The Security Manager is responsible for the generation, storage, and management of keys.
  • 8. Main Aspects • Obstacles to WSN security. • Requirements of a Secure WSN. • Attacks. • Defensive Measures.
  • 9. Network Security Fundamentals • Confidentiality: means that security mechanism must ensure that only intended receiver can correctly intercept a message and unauthorized access and usage can’t be done • Integrity : an unauthorized individual is not to be able to destroy the information, when a message is transfer from the sender to the receiver • Availability : an interruption shouldn’t occur, when a system and application are performing their tasks
  • 10. Challenges of security in WSNs • Remote Location: most of the WSN’s are operated in remoted area locations are very far away from our reach, b/c of this, they are left unattended. • Lack of central control: There is always a central point of control in sensor networks because of their scale and network dynamics. • Error Prone communications: there are variety of reasons, that includes errors are situated in channel, failure of router and collisions, packets in WSN may be lost or corrupted. • Resource constraint : traditional security mechanism that have very high overheads, for this resource constrained WSN’s are not suitable
  • 11. Security Attacks in WSN’s • Two categories : Active attacks & passive attacks • In passive attacks the realization of this attack is easy and difficult to detect . Traffic analysis, traffic monitoring are the various examples of passive attack • In active attacks an attacker tries to romve or modify the message which are transmitted on the network. Jaming, DOS, message replay are the examples
  • 12. Attacks • Vulnerable to a multitude of attacks such as DoS, traffic analysis, privacy violation, physical attacks and so on. • DoS: Jamming a node or set of nodes by transmission of a radio signal that interferes with radio frequencies being used. • Violate the communication protocol thus depleting valuable battery life.
  • 13. More attacks • Sybil attack: – Sybil attack is a huge destructive attack in sensor network, in this attack, a sensor nodes behaves as if it were a large number of nodes, by faking other nodes – Originally used against peer to peer networks but may also be used to disrupt routing algorithms, data aggregation etc. • Traffic Analysis Attacks: Take over the base station/nodes closest to base station.
  • 14. More attacks • Wormhole attack: – In wormhole attack attackers records a packet at one location in the network and send them to another location and replays it there. • DOS attack: In DOS attack, an attacker tries to make service or system inaccessible . • Jamming : A well known attack, it disturb the radio channel by sending useless information on the frequency band use. Jamming can be temporary or permanent.
  • 15. Defensive Measures • Key Establishment. • Secure Broadcasting and Multicasting. • More efficient routing protocols. • Intrusion Detection.
  • 16. Conclusion and Future Work Networks are shifted from wired to wireless quickly, WSNs is growing day by day and hot field in the area of research. WSNs are cost effective because it saves the Energy by using low power tiny sensor nodes that makes it popular, with the addition of different other features.WSNs have a variety of features and types that can accommodate many problems arising in different scenarios. The only need is the selection of the right approach on the right place, for getting the maximum benefit from the WSN and its types. I have a plan to find out an algorithm or mechanism that improves the performance and security issues, of the WSN. My presentation enhances the base for this emerging field and after it, i will pick a particular problem in WSN and work for an efficient approach